There are three types of trend analysis that I have used in the past to predict the future: geographic, temporal, and intuitive. I describe these three in the introduction to my Seven Trends in Networking and Security pitch.
Richard Stiennon delivers a timely, succinct exploration of cyber threats, hack attacks, crime on the web, and information warfare.
The Scobleizer vents his frustration with the Apple Brand Juggernaut in his post today. He seems upset that Mac users are so vehement in defense of Apple products.
I have to quote Lewis Page of the Register on this: A US government panel specially created to warn of danger from China has warned of danger from China. The panel, The US-China Economic and Security Review Commission (USCC), just published a 56 page document that they reported to congress last June.
That was my first reaction to reading this just posted article on BBC.com.
It is a pretty common theme of my Cyber Crime Scenario presentation that insiders are a risk. The more so because markets for data, especially credit card info, are making it possible for just about anay knowledge worker with access to data to rob you.
One likes to think that a secure web based email provider would be able to secure your email. It is becoming more and more evident that there truly is a threat against your private communications.
David Berlind comments in his blog about recent successful phishing attacks against Salesforce.com employees and customers.
There is nothing as fly-by-night as a political campaign. By this time next year the RonPaul2008 campaign will be history.
The office of the Inspector General of the Department of Homeland Security has issued a 41 page report on how the department is progressing on security. Summary findings:Systems are being accredited without key documents or missing key information.
As evidenced by my post last week I spent several days at the Gartner Symposium and ITExpo in Orlando last week. I can't get one incident out of my mind.